Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks

Among security problems of sensor networks, the wormhole attack is especially a serious one because its launch is rather easy and the detection is very difficult. Beside the malicious wormholes built deliberately by attackers, this paper presents another type of wormholes: natural wormholes according to the "shortcut" property of wormholes. Natural wormholes are critical links formed by the topological result of deployment. Both types of wormholes are harmful to normal network operations and need to be identified and repaired to avoid severe damages. This paper presents two novel distributed algorithms using only local connectivity information for detecting both types of wormholes. Unlike the previous approaches, the proposed solution requires no special hardware to get location information or time synchronization.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Paolo Santi Topology control in wireless ad hoc and sensor networks , 2005 .

[3]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[4]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[5]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[9]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .